메뉴 건너뛰기




Volumn , Issue , 2012, Pages 545-550

A secure and efficient revocation scheme for fine-grained access control in cloud storage

Author keywords

Cloud Storage; Fine Grained Access Control; User Revocation

Indexed keywords

ACCESS CONTROL POLICIES; ACCESS POLICIES; ATTRIBUTE SETS; CLOUD SERVERS; CLOUD STORAGES; CRYPTOGRAPHIC ACCESS CONTROLS; DATA CONTENTS; IMPORTANT FEATURES; KEY UPDATES; RE-ENCRYPTION; REVOCATION SCHEME; SECRET KEY; SECRET SHARING; USER REVOCATION;

EID: 84874256629     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudCom.2012.6427602     Document Type: Conference Paper
Times cited : (14)

References (21)
  • 4
    • 4544290272 scopus 로고    scopus 로고
    • Swaminathan: Scalable secure file sharing on untrusted storage
    • Kallahalla, M., Riedel, E., Swaminathan.: Scalable secure file sharing on untrusted storage. In: Proc. of FAST (2003).
    • (2003) Proc. of FAST
    • Kallahalla, M.1    Riedel, E.2
  • 9
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proc. of IEEE INFOCOM (2010).
    • (2010) Proc. of IEEE INFOCOM
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 10
    • 34547273527 scopus 로고    scopus 로고
    • Attribute based encryption for fine-grained access conrol of encrypted data
    • Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute Based Encryption for Fine-Grained Access Conrol of Encrypted Data. In: Proc. of ACM CCS (2006).
    • (2006) Proc. of ACM CCS
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 12
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • Yu, S., Wang, C., Ren, K., Lou, W.: Attribute Based Data Sharing with Attribute Revocation. In: Proc. of ACM ASIACCS (2010).
    • (2010) Proc. of ACM ASIACCS
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 13
    • 0018545449 scopus 로고
    • How to share a secret [J]
    • SHAMIR A.How to share a secret [J].Communications of the ACM, 1979, 24(11):612-613.
    • (1979) Communications of the ACM , vol.24 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 78649998200 scopus 로고    scopus 로고
    • Hierachical attibute-based encryption for fine-grained access control in cloud storage services
    • Wang, G., Liu, Q., Wu, J.: Hierachical attibute-based encryption for fine-grained access control in cloud storage services. In: Proc. of ACM CCS (2010)
    • (2010) Proc. of ACM , vol.CCS
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 17
    • 77952362084 scopus 로고    scopus 로고
    • Attribute based proxy re-encryption with delegating capabilities
    • Liang, X., Cao, Z., Lin, H.: Attribute based proxy re-encryption with delegating capabilities. In: Proc. of ACM ASIACCS (2009).
    • (2009) Proc. of ACM ASIACCS
    • Liang, X.1    Cao, Z.2    Lin, H.3
  • 18
    • 84855342560 scopus 로고    scopus 로고
    • On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption
    • Liu, Z., Cao, Z.: On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption. IACR Cryptology ePrint Archive 2010: 374 (2010).
    • (2010) IACR Cryptology EPrint Archive , vol.2010 , pp. 374
    • Liu, Z.1    Cao, Z.2
  • 20
    • 84874261579 scopus 로고    scopus 로고
    • Fine-grained data access control systems with user accountability in cloud computing
    • Li, J., Zhao, G., Chen, X.: Fine-grained Data Access Control Systems with User Accountability in Cloud Computing. In: Proc. of CloudCom (2010).
    • (2010) Proc. of CloudCom
    • Li, J.1    Zhao, G.2    Chen, X.3
  • 21
    • 84874244902 scopus 로고    scopus 로고
    • A secure and efficient role-based access policy towards cryptographic cloud storage
    • Hong, C., Lv, Z., Zhang, M.: A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage. In: Proc. of WAIM (2011).
    • (2011) Proc. of WAIM
    • Hong, C.1    Lv, Z.2    Zhang, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.